Active Directory has become the primary target of attackers who stealthily raid companies’ most vital assets. Our industry wrongly modelizes advanced attacks as flows that begin outside your organization, fly through networks and endpoints to eventually reach your data and vital assets. Unfortunately, this model ignores the ubiquitous, all-powerful overseer that orchestrates literally everything in your IT infrastructure: Active Directory. Which, as a consequence, receives too little attention from IT security specialists.
Steve Biography
B.Sc (Hons), C.Eng, CISM, SCF, MIET, MSAIEE
Steve Jump has an unashamedly technical background being both an engineering graduate and a chartered engineer, but he uses it to translate complex technology into serious business. He presently consults in the area of Information Security Governance and Information Security Risk, where he expresses support, sympathy, incredulity and fortunately, frequent flashes of inspiration at the state of Information Security risk management in business today.
With over twenty years of practical and strategic information and cyber security experience Steve now provides applied cyber security risk governance coaching, mentoring, and guidance at an Exco, Board and ISO level to ensure that non-technical and technical directors alike are able to understand that information security risk is about business success more than technology, and how this understanding adds significantly more value to a business as an enabler than a fear based approach.
Steve has driven the establishment of a Security Governance function recognisable to Risk Management, and successfully transitioned IT security functions into managed security enablers for business. He is conversant in the translation of new technologies, new regulatory requirements and new business models into the means to improve governance, reduce costs, and measurably reduce information security risk to businesses and their customers.
Steve has developed comprehensive Information Security and Information Technology Strategies , including Enterprise & Information Security Architectures that ensure business and IT align, including the creation of a business centric Information Security framework that can be used at any level of an organisation to identify threats and plan their security strategy and resources.
Steve provides both coaching and mentorship at all levels, from CIO’s forming a security team to postgraduate specialists joining that team. He frequently talks around security governance and has presented both simple and complex papers and keynotes around cyber security and risk management topics internationally.
Derek Biography
Derek educates IT professionals worldwide on Active Directory, Group Policy, and Security, and has authored over 15 books on Windows security and management. He’s famous for his video shorts in which he offers quick, practical solutions for Active Directory management.
Win with Blue Turtle and Alsid
Be one of our first 10 delegates to complete our post-webinar survey and stand a chance to win a Google Home Device